Project description
Current Activities
Terabit/s Switch Prototype
Seminars and Publications
Meetings and Events


R. Scandariato, Y. Ofek, M. Baldi, and P. Falcarin, "Application-oriented Trust in Networking and Computing," .

It is well recognized that preserving authenticity of applications being executed in untrusted machines (a.k.a. client-side security) is an open problem. Authenticity requires that application code is not tampered with, prior to or during execution, by a malicious user. This paper presents a novel method to assure authenticity of application code by means of an authenticity-preserving software module that is combined with the application code. The software module is a trusted logic component that can be replaced continuously from a trusted remote location during run-time. Hence, adversaries attempting to tamper with the application by means of reverse-engineering have arbitrary limited time to succeed. For added assurance, the software module produces continuous sequence of proofs of its proper operation that are verified remotely. The above-mentioned method is dubbed remote entrusting. The paper discusses general, domain-neutral solution principles for remote entrusting and presents actual implementation and experimentation in the context of client-server applications.

Pages hosted by "IP-FLOW Group" - DIT - Università di Trento - Italy.
© IP-FLOW Project 2004, All Rights Reserved.
Last updated: 2008-09-10 05:37:04